EP2595085A3 - Verfahren zum Schutz einer Chipkarte gegen unberechtigte Benutzung, Chipkarte und Chipkarten-Terminal - Google Patents

Verfahren zum Schutz einer Chipkarte gegen unberechtigte Benutzung, Chipkarte und Chipkarten-Terminal Download PDF

Info

Publication number
EP2595085A3
EP2595085A3 EP13155103.8A EP13155103A EP2595085A3 EP 2595085 A3 EP2595085 A3 EP 2595085A3 EP 13155103 A EP13155103 A EP 13155103A EP 2595085 A3 EP2595085 A3 EP 2595085A3
Authority
EP
European Patent Office
Prior art keywords
chip card
chip
protecting
symmetric key
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
EP13155103.8A
Other languages
English (en)
French (fr)
Other versions
EP2595085A2 (de
EP2595085B1 (de
Inventor
Kim Dr. Nguyen
Frank Byszio
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bundesdruckerei GmbH
Original Assignee
Bundesdruckerei GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bundesdruckerei GmbH filed Critical Bundesdruckerei GmbH
Priority to PL13155103T priority Critical patent/PL2595085T3/pl
Publication of EP2595085A2 publication Critical patent/EP2595085A2/de
Publication of EP2595085A3 publication Critical patent/EP2595085A3/de
Application granted granted Critical
Publication of EP2595085B1 publication Critical patent/EP2595085B1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/3013Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the discrete logarithm problem, e.g. ElGamal or Diffie-Hellman systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3215Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Algebra (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

Die Erfindung betrifft ein Verfahren zum Schutz einer Chipkarte (104) gegen unberechtigte Benutzung mit folgenden Schritten:
- Eingabe einer ersten Kennung (116) in einen Chipkarten-Terminal (100),
- Erzeugung eines Chiffrats aus zumindest einem ersten Kommunikationsparameter (K1; KA1, D1) mit Hilfe eines aus der ersten Kennung abgeleiteten ersten symmetrischen Schlüssels (S1), wobei mit Hilfe des Kommunikationsparameters ein geschützter erster Kommunikationskanal (112) zwischen dem Chipkarten-Terminal und der Chipkarte definierbar ist,
- Übertragung des Chiffrats über einen vordefinierten Kommunikationskanal (108) von dem Chipkarten-Terminal an die Chipkarte,
- Versuch einer Entschlüsselung des Chiffrats mit Hilfe eines zweiten symmetrischen Schlüssels (S2) durch die Chipkarte, wobei das Resultat der Entschlüsselung nur dann der erste Kommunikationsparameter ist, wenn der erste symmetrische Schlüssel dem zweiten symmetrischen Schlüssel gleicht, sodass der geschützte erste Kommunikationskanal nur dann zwischen dem Chipkarten-Terminal und der Chipkarte definierbar ist, wenn die erste Kennung zutreffend ist.
EP13155103.8A 2007-10-29 2008-10-20 Verfahren zum Schutz einer Chipkarte gegen unberechtigte Benutzung, Chipkarte und Chipkarten-Terminal Active EP2595085B1 (de)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PL13155103T PL2595085T3 (pl) 2007-10-29 2008-10-20 Sposób zabezpieczenia karty procesorowej przed nieuprawnionym użyciem, karta procesorowa oraz terminal kart procesorowych

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE102007000589A DE102007000589B9 (de) 2007-10-29 2007-10-29 Verfahren zum Schutz einer Chipkarte gegen unberechtigte Benutzung, Chipkarte und Chipkarten-Terminal
PCT/EP2008/064116 WO2009056463A2 (de) 2007-10-29 2008-10-20 Verfahren zum schutz einer chipkarte gegen unberechtigte benutzung, chipkarte und chipkarten-terminal
EP08845554.8A EP2218028B1 (de) 2007-10-29 2008-10-20 Verfahren zum schutz einer chipkarte gegen unberechtigte benutzung, chipkarte und chipkarten-terminal

Related Parent Applications (3)

Application Number Title Priority Date Filing Date
EP08845554.8 Division 2008-10-20
EP08845554.8A Division-Into EP2218028B1 (de) 2007-10-29 2008-10-20 Verfahren zum schutz einer chipkarte gegen unberechtigte benutzung, chipkarte und chipkarten-terminal
EP08845554.8A Division EP2218028B1 (de) 2007-10-29 2008-10-20 Verfahren zum schutz einer chipkarte gegen unberechtigte benutzung, chipkarte und chipkarten-terminal

Publications (3)

Publication Number Publication Date
EP2595085A2 EP2595085A2 (de) 2013-05-22
EP2595085A3 true EP2595085A3 (de) 2014-01-15
EP2595085B1 EP2595085B1 (de) 2018-08-29

Family

ID=40405031

Family Applications (3)

Application Number Title Priority Date Filing Date
EP13155103.8A Active EP2595085B1 (de) 2007-10-29 2008-10-20 Verfahren zum Schutz einer Chipkarte gegen unberechtigte Benutzung, Chipkarte und Chipkarten-Terminal
EP08845554.8A Active EP2218028B1 (de) 2007-10-29 2008-10-20 Verfahren zum schutz einer chipkarte gegen unberechtigte benutzung, chipkarte und chipkarten-terminal
EP13155097.2A Active EP2595083B1 (de) 2007-10-29 2008-10-20 Verfahren zum Schutz einer Chipkarte gegen unberechtigte Benutzung, Chipkarte und Chipkarten-Terminal

Family Applications After (2)

Application Number Title Priority Date Filing Date
EP08845554.8A Active EP2218028B1 (de) 2007-10-29 2008-10-20 Verfahren zum schutz einer chipkarte gegen unberechtigte benutzung, chipkarte und chipkarten-terminal
EP13155097.2A Active EP2595083B1 (de) 2007-10-29 2008-10-20 Verfahren zum Schutz einer Chipkarte gegen unberechtigte Benutzung, Chipkarte und Chipkarten-Terminal

Country Status (7)

Country Link
US (1) US8353054B2 (de)
EP (3) EP2595085B1 (de)
CN (2) CN103258169B (de)
DE (1) DE102007000589B9 (de)
ES (2) ES2690366T3 (de)
PL (2) PL2595083T3 (de)
WO (1) WO2009056463A2 (de)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2821225B1 (fr) * 2001-02-20 2005-02-04 Mobileway Systeme de paiement electronique a distance
DE102009042284A1 (de) 2009-09-22 2011-03-31 Giesecke & Devrient Gmbh Verfahren zum Aufbauen eines gesicherten Kommunikationskanals
US8837732B2 (en) * 2010-01-14 2014-09-16 Nokia Siemens Networks Oy Method and device for data processing in a wireless network
CN101807236B (zh) * 2010-02-08 2012-11-28 深圳市同洲电子股份有限公司 一种鉴权方法、系统及对应的前端设备
CN102568097B (zh) * 2010-12-08 2017-02-22 邵通 一种增强电子钱包安全的方法和系统
US11100431B2 (en) * 2011-05-10 2021-08-24 Dynamics Inc. Systems and methods for mobile authorizations
US11392860B2 (en) * 2011-05-10 2022-07-19 Dynamics Inc. Systems and methods for contactless communication mechanisms for cards and mobile devices
DE102011079441A1 (de) * 2011-07-19 2013-01-24 Bundesdruckerei Gmbh Verfahren zum Schutz eines Chipkarten-Terminals gegen unberechtigte Benutzung
US8690054B1 (en) 2013-05-29 2014-04-08 The Toronto-Dominion Bank System and method for chip-enabled card transaction processing and alert communication
CN103619013A (zh) * 2013-12-04 2014-03-05 孙国华 手机与智能卡交互应用的安全绑定方法
US11086797B2 (en) * 2014-10-31 2021-08-10 Hewlett Packard Enterprise Development Lp Systems and methods for restricting write access to non-volatile memory
TWI641966B (zh) * 2018-01-15 2018-11-21 群聯電子股份有限公司 記憶體儲存系統、主機系統驗證方法及記憶體儲存裝置
CN110069934B (zh) * 2018-01-23 2022-12-13 群联电子股份有限公司 存储器存储系统、主机系统验证方法及存储器存储装置
CN114244505B (zh) * 2021-12-09 2024-02-20 武汉天喻信息产业股份有限公司 一种基于安全芯片的安全通信方法

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19850308A1 (de) * 1998-10-30 2000-05-11 Deutsche Telekom Mobil Verfahren zum Schutz von Chipkarten vor missbräuchlicher Verwendung in Fremdgeräten
DE10338643A1 (de) * 2003-08-20 2005-03-17 Alkassar, Ammar, Dipl.-Inform. Verfahren zur sicheren Objektidentifikation

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3523237A1 (de) * 1985-06-28 1987-01-02 Siemens Ag Anordnung zum sichern des transports von chipkarten
US5241599A (en) * 1991-10-02 1993-08-31 At&T Bell Laboratories Cryptographic protocol for secure communications
DE19507043B4 (de) * 1995-03-01 2006-11-23 Deutsche Telekom Ag Verfahren zur Erzeugung und Verteilung unpersonalisierter vertraulicher elektronischer Schlüssel
DE19507044C2 (de) * 1995-03-01 2000-04-06 Deutsche Telekom Ag Verfahren zur Erzeugung und Verteilung persönlicher Identifikations-Nummern (PIN)
US6226383B1 (en) * 1996-04-17 2001-05-01 Integrity Sciences, Inc. Cryptographic methods for remote authentication
DE19850307C2 (de) * 1998-10-30 2002-08-01 T Mobile Deutschland Gmbh Verfahren zum Schutz vor Missbrauch bei Chipkarten
EP1022638A3 (de) * 1999-01-12 2001-05-02 International Business Machines Corporation Verfahren und Vorrichtung zur gesicherten Datenverarbeitung zwischen zwei Verarbeitungsvorrichtungen
CN1249972C (zh) * 2000-06-05 2006-04-05 凤凰技术有限公司 使用多个服务器的远程密码验证的系统和方法
JP4187935B2 (ja) * 2000-08-23 2008-11-26 株式会社東芝 無線通信システム、送信装置、受信装置及びコンテンツデータ転送方法
US7152783B2 (en) * 2001-07-10 2006-12-26 Smart Card Integrators, Inc. Combined card reader and bill acceptor
WO2004036467A1 (en) * 2002-10-17 2004-04-29 Vodafone Group Plc. Facilitating and authenticating transactions
US20050182934A1 (en) * 2004-01-28 2005-08-18 Laszlo Elteto Method and apparatus for providing secure communications between a computer and a smart card chip
US7512800B2 (en) * 2004-02-03 2009-03-31 Hewlett-Packard Development Company, L.P. Key management technique for establishing a secure channel
CN100375102C (zh) * 2004-11-30 2008-03-12 国际商业机器公司 非接触卡读卡器和信息处理系统
EP1899803A2 (de) * 2005-06-29 2008-03-19 Koninklijke Philips Electronics N.V. Anordnung für und verfahren zum schutz einer datenschutzvorrichtung gegen einen angriff oder eine analyse
EP1752937A1 (de) * 2005-07-29 2007-02-14 Research In Motion Limited System und Verfahren zur verschlüsselten Eingabe einer persönlichen Identifizierungsnummer für eine Chipkarte
JP4823717B2 (ja) * 2006-02-28 2011-11-24 株式会社日立製作所 暗号通信システム、端末状態管理サーバ、暗号通信方法、および端末状態管理方法
CN100345149C (zh) * 2006-03-17 2007-10-24 清华大学 用于射频识别系统的加密验证方法
US9092635B2 (en) * 2006-03-31 2015-07-28 Gemalto Sa Method and system of providing security services using a secure device
CN2898953Y (zh) * 2006-04-13 2007-05-09 上海复旦微电子股份有限公司 集成安全加密认证功能的非接触卡读写装置
FR2906952B1 (fr) * 2006-10-05 2009-02-27 Inside Contactless Sa Procede d'authentification mutuelle entre une interface de communication et un processeur hote d'un chipset nfc.
US7831051B2 (en) * 2007-03-13 2010-11-09 Aladdin Europe Gmbh Secure communication between a hardware device and a computer

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19850308A1 (de) * 1998-10-30 2000-05-11 Deutsche Telekom Mobil Verfahren zum Schutz von Chipkarten vor missbräuchlicher Verwendung in Fremdgeräten
DE10338643A1 (de) * 2003-08-20 2005-03-17 Alkassar, Ammar, Dipl.-Inform. Verfahren zur sicheren Objektidentifikation

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
BRUCE SCHNEIER: "Applied Cryptography", 1996, JOHN WILEY AND SONS, XP002520924 *
CHRISTIAN HAINZ: "Kryptographie und elliptische Kurven", 1 April 2001 (2001-04-01), pages 2 - 14, XP055056091, Retrieved from the Internet <URL:http://homepages.thm.de/~hg10013/Lehre/MMS/SS01_WS0102/Elyps/index.html> [retrieved on 20130312] *
SCHNEIER B ED - SCHNEIER B: "APPLIED CRYPTOGRAPHY : PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C., Chapter 22: Key-Exchange Algorithms", 1 January 1996, APPLIED CRYPTOGRAPHY : PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C, NEW YORK, NY : JOHN WILEY & SONS, US, PAGE(S) 513 - 516, ISBN: 978-0-471-12845-8, XP002667535 *

Also Published As

Publication number Publication date
PL2595083T3 (pl) 2017-10-31
EP2595083A1 (de) 2013-05-22
EP2595085A2 (de) 2013-05-22
ES2635616T3 (es) 2017-10-04
PL2595085T3 (pl) 2018-12-31
CN103258169B (zh) 2017-08-22
DE102007000589B3 (de) 2009-07-09
WO2009056463A3 (de) 2009-09-17
CN101842792A (zh) 2010-09-22
DE102007000589B9 (de) 2010-01-28
CN103258169A (zh) 2013-08-21
US8353054B2 (en) 2013-01-08
EP2218028A2 (de) 2010-08-18
EP2218028B1 (de) 2014-12-10
US20100223479A1 (en) 2010-09-02
EP2595085B1 (de) 2018-08-29
CN101842792B (zh) 2013-06-19
ES2690366T3 (es) 2018-11-20
EP2595083B1 (de) 2017-07-05
WO2009056463A2 (de) 2009-05-07

Similar Documents

Publication Publication Date Title
EP2595085A3 (de) Verfahren zum Schutz einer Chipkarte gegen unberechtigte Benutzung, Chipkarte und Chipkarten-Terminal
EP3218893B1 (de) Gehärtete white box implementierung
EP1615173A3 (de) Verfahren und Anordnung zum Generieren eines geheimen Sitzungsschlüssels
DE102013206185A1 (de) Verfahren zur Erkennung einer Manipulation eines Sensors und/oder von Sensordaten des Sensors
ATE492956T1 (de) Verfahren und vorrichtung zur ermittlung eines kommunikationsschlüssels zwischen einem ersten kommunikationspartner und einem zweiten kommunikationspartner unter benutzung einer dritten partei
WO2009121658A3 (de) Verwendung eines mobilen telekommunikationsgeräts als elektronische gesundheitskarte
DE10111756A1 (de) Verfahren zur Authentikation
EP2779722A3 (de) Verfahren zum Personalisieren eines Sicherheitsmuduls eines Tele-kommunikations-Endgerätes
WO2012119790A1 (de) Verfahren zur authentisierung, rf-chip-dokument, rf-chip-lesegerät und computerprogrammprodukte
CN103079196A (zh) 加密通话方法及终端
EP1455311A3 (de) Verfahren zum sicheren Datenaustausch
EP1801724A3 (de) Verfahren und Anordnung zum Bereitstellen sicherheitsrelevanter Dienste durch ein Sicherheitsmodul einer Frankiermaschine
EP1810442B1 (de) Vorrichtung und verfahren zum detektieren einer manipulation eines informationssignals
DE102014001843B3 (de) Mikroprozessorsystem
EP2481183A1 (de) Verfahren zum aufbauen eines gesicherten kommunikationskanals
WO2016206976A1 (de) Verfahren und system zur authentifizierung eines dokumentes sowie verfahren zur herstellung und/oder personalisierung eines dokumentes
EP2528364B1 (de) Verfahren und Vorrichtung zum Bereitstellen einer Identifikationskennung eines elektronischen Endgeräts
DE602004003523T2 (de) Sichere Datenübertragung von programmierbaren Mobiltelefonen in einem Mobilfunknetz
EP3384627A1 (de) Verfahren und vorrichtung für die sichere speicherung elektronischer identifikationsdokumente auf einem mobilen endgerät
EP2439902A3 (de) Verfahren und Anordnung zum rechtsverbindlichen Senden und Empfangen von vertraulichen elektronischen Mitteilungen
EP1469658A3 (de) Verfahren zum Schutz von Daten gegen unberechtigte Benutzung auf einem Mobilfunkgerät
DE102015210576A1 (de) Verschlüsselungs-Pixelmatrix; Verfahren zu ihrer Erzeugung; Bilddatei, Videodatei und Videodatenstrom mit einer solchen Pixelmatrix, Verfahren zur Erzeugung einer Klarbildmatrix ausgehend von einer solchen Verschlüsselungs-Pixelmatrix sowie Dekodier-Einheit zur Durchführung dieses Verfahrens
DE102005058275B4 (de) Verfahren und Vorrichtung zum Überprüfen einer sicheren Übermittlung eines bereitgestellten Dokumentes an ein Datenschutzmodul sowie Verfahren und Vorrichtung zum sicheren Überprüfen einer Authentizität eines empfangenen geschützten Dokumentes
DE102005038106A1 (de) Verfahren zur Absicherung der Authentisierung eines tragbaren Datenträgers gegen ein Lesegerät über einen unsicheren Kommunikationsweg
WO2019137656A1 (de) Radarsystem mit mindestens einer verschlüsselbaren datenleitung

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AC Divisional application: reference to earlier application

Ref document number: 2218028

Country of ref document: EP

Kind code of ref document: P

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

PUAL Search report despatched

Free format text: ORIGINAL CODE: 0009013

AK Designated contracting states

Kind code of ref document: A3

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

RIC1 Information provided on ipc code assigned before grant

Ipc: G06F 21/77 20130101AFI20131210BHEP

Ipc: H04L 9/30 20060101ALI20131210BHEP

Ipc: H04L 9/08 20060101ALN20131210BHEP

17P Request for examination filed

Effective date: 20140715

RBV Designated contracting states (corrected)

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

17Q First examination report despatched

Effective date: 20170123

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 9/30 20060101ALI20180221BHEP

Ipc: H04L 9/32 20060101ALI20180221BHEP

Ipc: G06F 21/77 20130101AFI20180221BHEP

INTG Intention to grant announced

Effective date: 20180322

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

AC Divisional application: reference to earlier application

Ref document number: 2218028

Country of ref document: EP

Kind code of ref document: P

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1036009

Country of ref document: AT

Kind code of ref document: T

Effective date: 20180915

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: GERMAN

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 502008016306

Country of ref document: DE

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 11

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2690366

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20181120

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181129

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181129

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181130

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20181229

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 502008016306

Country of ref document: DE

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20181031

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181020

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

26N No opposition filed

Effective date: 20190531

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181031

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20181020

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20081020

Ref country code: CY

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20180829

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230526

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20231023

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: GB

Payment date: 20231025

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: ES

Payment date: 20231117

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: IT

Payment date: 20231031

Year of fee payment: 16

Ref country code: FR

Payment date: 20231023

Year of fee payment: 16

Ref country code: FI

Payment date: 20231023

Year of fee payment: 16

Ref country code: DE

Payment date: 20231018

Year of fee payment: 16

Ref country code: CH

Payment date: 20231102

Year of fee payment: 16

Ref country code: AT

Payment date: 20231019

Year of fee payment: 16

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: PL

Payment date: 20231006

Year of fee payment: 16